It is funny, even after previous awareness messages, I have received requests to "...disable MFA for the service account..." (actually EntraID user account) "...because it cannot authenticate in Azure and scripts are failing due to MFA...".
Comments
Log in with your Bluesky account to leave a comment
Service accounts were the safest way for automation scripts to authenticate because you could apply CA policies to limit use to specific IPs or devices. But now you can buy Workload Identity licences and protect app registrations with CA policies too. Time to switch.
If only that was the only problem. I’m working with a team that are still using legacy authentication in one of their apps and they have no plans of upgrading to a more modern way of using service principals.
Comments
https://learn.microsoft.com/en-us/entra/identity/conditional-access/workload-identity